Leonardo Regano

Orcid: 0000-0002-9259-5157

According to our database1, Leonardo Regano authored at least 16 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Security at the Edge for Resource-Limited IoT Devices.
Sensors, January, 2024

2023
Design, implementation, and automation of a risk management approach for man-at-the-End software protection.
Comput. Secur., September, 2023

A Model for Automated Cybersecurity Threat Remediation and Sharing.
Proceedings of the 9th IEEE International Conference on Network Softwarization, 2023

2022
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection.
Comput. Electr. Eng., 2022

A model of capabilities of Network Security Functions.
Proceedings of the 8th IEEE International Conference on Network Softwarization, 2022

Computer-Aided Reverse Engineering of Protected Software.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

2020
Empirical assessment of the effort needed to attack programs protected with client/server code splitting.
Empir. Softw. Eng., 2020

Software Protection as a Risk Analysis Process.
CoRR, 2020

Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning.
IEEE Access, 2020

2019
An Expert System for Automatic Software Protection.
PhD thesis, 2019

A meta-model for software protections and reverse engineering attacks.
J. Syst. Softw., 2019

2017
Ethical issues of ISPs in the modern web.
CoRR, 2017

Estimating Software Obfuscation Potency with Artificial Neural Networks.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Towards Optimally Hiding Protected Assets in Software Applications.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Towards Automatic Risk Analysis and Mitigation of Software Applications.
Proceedings of the Information Security Theory and Practice, 2016

Assessment of Source Code Obfuscation Techniques.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016


  Loading...